CN110521223A - Mobile device management system and method - Google Patents

Mobile device management system and method Download PDF

Info

Publication number
CN110521223A
CN110521223A CN201880025942.1A CN201880025942A CN110521223A CN 110521223 A CN110521223 A CN 110521223A CN 201880025942 A CN201880025942 A CN 201880025942A CN 110521223 A CN110521223 A CN 110521223A
Authority
CN
China
Prior art keywords
mobile device
beacon
signal
unique identifier
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880025942.1A
Other languages
Chinese (zh)
Inventor
F.W.小古利克
A.萨克拉尔
G.W.古利克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Scorpio Security Products Co
Original Assignee
Scorpio Security Products Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Scorpio Security Products Co filed Critical Scorpio Security Products Co
Publication of CN110521223A publication Critical patent/CN110521223A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1427Mechanical actuation by lifting or attempted removal of hand-portable articles with transmitter-receiver for distance detection
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/0202Child monitoring systems using a transmitter-receiver system carried by the parent and the child
    • G08B21/0277Communication between units on a local network, e.g. Bluetooth, piconet, zigbee, Wireless Personal Area Networks [WPAN]
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/35Services specially adapted for particular environments, situations or purposes for the management of goods or merchandise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/10Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • Child & Adolescent Psychology (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A kind of mobile device management system.First beacon includes the first wireless transceiver, is programmed to: receiving the first unique identifier and the first signal level;And repeatedly emit the first beacon signal with the first unique identifier with the first signal level.Second beacon includes the second wireless transceiver, is programmed to: receiving the second unique identifier and second signal level;And repeatedly emit the second beacon signal with the second unique identifier with second signal level.Mobile device includes at least one wireless transceiver;Memory;And processor.When wireless transceiver receives the first beacon signal with the first unique identifier, mobile device is based on the firstth area of the first unique identifier execution and enters movement.When wireless transceiver receives the one or more in the first beacon signal or the second beacon signal, mobile device terminates warning action.When wireless transceiver receives the second beacon signal with the second unique identifier, mobile device is based on the secondth area of the second unique identifier execution and enters movement.

Description

Mobile device management system and method
Cross reference to related applications
This application claims in 2 months 2017 U.S. Provisional Patent Application Serial No. 62/461,448 and 2017 year 10 submitted for 21st The priority for the U.S. Provisional Patent Application Serial No. 62/578,232 that the moon is submitted on the 27th, each of described application pass through reference In being hereby incorporated by reference in its entirety.
Technical field
The present invention relates to the security system for managing mobile device, shown in the mobile device such as retail shop Hand-hold electronic equipments.
Background technique
Retailer sells functional hand-held electricity with a certain range in the shape and size of a certain range to the public Sub- equipment.Encouragement customer checks at display location and the use of the functionality of equipment is the valuable sale used by retailer Technology.In order to reduce the risk of stealing associated with this sales tactics, retailer uses various safety measures.
A kind of common safety measure is using alarm sensor, when contacting placement when the surface with hand-hold electronic equipments Setting, and activated when (for example, when sensor is removed) it loses with equipment and contacts.Typical alarm sensor uses Adhesive tape or similar stickiness product are attached to a part of hand-hold electronic equipments.During use, binder often fails, It loses and contacts with hand-hold electronic equipments so as to cause alarm sensor, and cause to alarm and notify and frighten not guilty Gu Visitor, to negatively affected their shopping experience.When these false alarms are occurred with high-frequency, retailer tends to neglect It slightly alarms or even closes them to avoid interference customer purchase experience, to make attack of the retailer vulnerable to stealing.In addition, Ability when these alarm sensors only lose the contact of the part for the hand-hold electronic equipments being already attached to it in alarm sensor It is activated.For example, burglar can remove and steal radio if alarm sensor is attached to wireless telephonic battery cover The rest part (that is, all components other than battery cover) of words, without activating alarm sensor.In order to struggle with this, (for example, front of and behind, battery inside etc.), installation is multiple in the multiple positions of retailer usually on a handheld electronic device Alarm sensor.These alarm sensors usually interfere customer to inspect equipment.In some cases, it is mounted on hand-held electronics These alarm sensors in equipment can be lighted in the excessive heat being subjected in equipment.
Summary of the invention
A kind of mobile device management system.First beacon includes the first wireless transceiver, is programmed to: receiving first only One identifier and the first signal level;And repeatedly emit the first letter with the first unique identifier with the first signal level Mark signal.First signal level of the first beacon signal establishes first area of coverage near the first beacon.Second beacon includes the Two wireless transceivers, are programmed to: receiving the second unique identifier and second signal level;And with second signal level weight Emit the second beacon signal with the second unique identifier again.The second signal level of second beacon signal is in the second beacon Nearby establish second area of coverage.A kind of mobile device includes at least one wireless transceiver;Memory;And processor.Work as nothing When line transceiver receives the first beacon signal with the first unique identifier, mobile device is based on the first unique identifier and holds The firstth area of row enters movement.When wireless transceiver fails to receive the first beacon signal up to first time period, mobile device is held Row warning action.It is mobile when wireless transceiver receives the one or more in the first beacon signal or the second beacon signal Device end warning action.When wireless transceiver receives the second beacon signal with the second unique identifier, movement is set It is standby that movement is entered based on the secondth area of the second unique identifier execution.
Detailed description of the invention
By reference to embodiment, the particularly description of the invention to summarizing briefly above, the embodiment can be obtained In some illustrate in the accompanying drawings.It should be noted, however, that attached drawing only illustrates exemplary embodiments of the invention, and therefore do not answer Restriction on its scope is considered, because the present invention allows other equivalent effective embodiments.Therefore, for a further understanding of Essence and purpose of the invention, reference can be made to following specific embodiments by being read in conjunction with the accompanying drawings, in the drawing:
Fig. 1 is the high level diagram of the component of embodiment for the system for managing mobile device that shows;
Fig. 2 is the diagram according to the monitor area of the system for Fig. 1 of one or more aspects described herein;And
Fig. 3 is according to the surveillance zone in more floors of the system for Fig. 1 of one or more aspects described herein building The diagram in domain;And
Fig. 4 A-4F is the process according to the method for providing safety to mobile device of one or more aspects described herein Figure.
Specific embodiment
In the following description, some aspects will be described so that the term of software program can be implemented as usually.This field skill Art personnel will readily appreciate that, the equivalent of this software can also be constructed with hardware, firmware or microcode.Because data are grasped Vertical algorithm and system are well known, so this specification will be particular for one of formation system and method described herein Point or the algorithm and system that more directly cooperate with it.This algorithm and system that are not shown or described in detail herein and It is from known in the art for generating and handling the hardware of signal or the other aspects of software involved in it in other ways This system, algorithm, component and element selection.System and method as described in this article are given, it is not specific herein The software for realizing any aspect for showing, suggesting or describing is conventional and in the ordinary skill in this field.
Fig. 1 is the high level diagram of mobile device security system 102.System 102 include mobile device 10, in addition to it is other with Outside, all cellular phones in this way or tablet computer.Although system 102 is illustrated as including single mobile device 10, it is to be appreciated that , security system 102 may include multiple mobile devices 10.In embodiment, mobile device 10 is for retail shop Show model.Mobile device 10 includes processor 112 and memory 114.Memory 114 can be the storage of any suitable type Device.
In addition, mobile device 10 may include imaging device 118.The equipment that imaging device 118 can be any suitable type, It includes static shooting camera, photographic camera or combinations thereof.Mobile device 10 may include towards front imaging device, towards back Face imaging device or combinations thereof.
Mobile device 10 includes power supply 120, such as battery.For example, power supply 120 can be lithium ion battery.Power supply 120 can It is recharged with the charging cable via the interface port (not shown) for being coupled to mobile device 10.
In addition, mobile device 10 includes alarm 116.Alarm 116 can be the alarm of any suitable type.Example Such as, alarm can be audible alarm, visual alarm or combinations thereof.In addition, alarm 116 can be due to many reasons quilt Activation, as will be discussed further below like that.In this example, alarm 116 may include different rank, such as depend on Different tones or different colors in the reason of alarm 116 is activated.When mobile device 10 enters alarm mode (also referred to as For on-warning mode) when, alarm 116 can be activated.In addition, alarm can be activated when charging cable and power supply 120 disconnect 16.It in this example, can be by using password or pass code when the disconnection due to charging cable activates alarm 116 (passcode) alarm is deactivated.In embodiment, it when deactivating alarm 116 by using pass code, only disables Sound, and mobile device 10 is still monitored.
Mobile device 10 may include position tracker 122.Position tracker 122 can be used for positioning mobile device 10. In this example, position tracker 122 is global positioning system (GPS) equipment.
Mobile device 10 further includes wireless transmitter/receiver 124 and Bluetooth Receiver 126.In embodiment, wireless hair Emitter/receiver 124 can be received via WiFi connection or cellular network and transmitting data.In embodiment, Bluetooth Receiver 126 can receive via bluetooth connection and emit signal.In other embodiments, receiver 126 and wireless transmitter/receiver 124 can be single radio frequency subsystem, or can be the software-based wireless electron operated on processor 112 System.
System 2 can additionally include server 128.In embodiment, server 128 is security server.Server 128 receive data via wireless transmitter/receiver 124 or device data service slave mobile device 10.For example, in addition to it is other with Outside, current device state, image, alert data and location information can be emitted to server 128 by mobile device 10.In addition, Mobile device 10 can emit the record for enabling the people of alarm 116 or disabling alarm 116.For example, mobile device 10 can be with Emit the identification information and image data of such as pass code or information of registering to server 128.What server 128 can safeguard When and who enable or disable the record of alarm 116.In embodiment, server 128 can remember data record and image Picture recording closes.In addition, server 128 can safeguard the record of the reason of each Activation of buzzer.
Server 128 can monitor mobile device 10.For example, mobile device 10 can send conventional letter to server 128 Number.When being not received by signal in server 128, server 128 can send signal or to mobile device 10 hair sound of heavy breathing Sound is to test the responsiveness of mobile device 10.If mobile device 10 is not responding to, server 128 can create alarm or logical Know.
System 2 further includes the beacon 130 with bluetooth transmitters 132.In another embodiment, beacon 130 is any nothing Line electric frequency transceiver comprising near-field communication, WiFi, cellular communication etc..Beacon 130 is via bluetooth transmitters 132 to movement The Bluetooth Receiver 126 of equipment 10 sends signal.In another embodiment, receiver 126 is any radio frequency transceiver, It includes near-field communication, WiFi, cellular communication etc..Beacon 130 can be placed in fixed position, and in embodiment, When being not received by signal in Bluetooth Receiver 126, such as when mobile device 10 exceeds the range of bluetooth transmitters 132 When, alarm 116 can be activated.In another embodiment, when in the range that mobile device 10 is moved to bluetooth transmitters 132 simultaneously And when receiving Bluetooth signal by Bluetooth Receiver 126, alarm 116 can be activated.In another embodiment, beacon 130 can (such as advertisement) will be notified to be pushed to mobile device 10 via bluetooth transmitters 132.
Although beacon 130 is being described above as with bluetooth transmitters 132, transmitter 132 can emit any The wireless signal of suitable type, such as WiFi signal or radio frequency signals.In addition, though beacon 130 be described as it is discrete Equipment, it is to be appreciated that, the functionality of beacon 130 can be included in existing equipment.For example, beacon 130 can be Transmitting other than the typical operation of wireless router is wireless or the wireless router of RF signal.Similarly, mobile device 10 Bluetooth Receiver 126 can be configured to receive any suitable type according to the signal emitted by the transmitter 132 of beacon 130 Signal.
Beacon 130 includes power supply (not shown), such as battery.In embodiment, battery has the average longevity in 5 (5) years Life.In embodiment, the battery life of beacon can be monitored to ensure the timely replacement to beacon battery.In subsequent Fig. 2 and In Fig. 3, for ease of understanding, the different instances of beacon 130 are noted as being followed by the letter b of number.
Fig. 2 is the diagram of monitor area 200.Monitor area 200 includes for entering or leaving the single of monitor area 200 Outlet 210.As an example, monitor area 200 can indicate retail shop, stock exchange place, library, safety devices, quotient Industry enterprise or in any other position for wherein it is expected to monitor mobile device.Although monitor area 200 can indicate more Kind different uses model, but be to provide for clearness, and example set forth below will be stated from the viewpoint of retail shop, and And it will be appreciated that will not be limited the scope of the present disclosure only for such description of clearness.
Continue the embodiment of Fig. 2, monitor area 200 includes three desk T1-T3, can be used for showing different model Mobile device, such as multiple equipment 10', including a particular device 10 being described in detail as shown in figure 1.In retail shop's example In, the equipment of different brands or the different model from same brand can be placed on desk T1-T3, for consumer's friendship Mutually.In library's example, the equipment that desk can be used for holding such as E-book reader, for reading different themes.
Advantageously, technology described herein allows the interaction of consumer and equipment 10,10', without tether or The monitoring parts of attachment.On the contrary, each of equipment 10,10 ' includes providing to include as referring to being further explained in detail Fig. 4 A The application (commonly referred to as " app ") of the mobile device management of security monitoring.Each of equipment 10,10 ' includes radio frequency Receiver, such as Bluetooth Receiver 126(is referring to Fig. 1).
That be disposed adjacent with desk T1-T3 is beacon B1-B3 respectively.Each of beacon B1-B3 includes for sending out respectively Send the wireless transmission capability of the existing signal in corresponding area Z1-Z3.In addition, outlet 210 further includes the beacon B4 being disposed adjacent, It establishes corresponding area Z4.Signal from beacon B1-B4 can be received and be handled by equipment 10,10 '.
Beacon B1-B4 can be Bluetooth Low Energy beacon, such as Estimote beacon, including from New York, NY Estimote position beacon or Estimote obtained by Estimote company are close to beacon.In another example, beacon B1-B4 It can be the beacon specially built including any suitable radio frequency technique (WiFi, CDMA etc.), for passing through The transmissions such as signal strength, data information can limit the configurable signal in area.Beacon B1-B4, which is sent, has signal specific intensity Signal specific, and shortage or these factors based on signal itself, signal strength, the presence of signal or detectable signal In any combination, can establish area Z1-Z4.In another example, beacon itself may include programmable non-right to create Claim multiple Wave beam forming antennas in area.In addition, wall and material that the actual zone of creation can depend in monitor area 200 are deposited In.
In operation, beacon B1-B4 is deployed in respectively near desk T1-T3 and outlet 210.In one example, such as The independent beacon of beacon B2 can be deployed on desk T2, with establish include in desk T2 and monitor area 200 around field The area Z2 in ground space.In another example, such as beacon of beacon B4 can be deployed in the building for accommodating monitor area 200 In ceiling or near, and more specifically, be deployed in outlet 210 overlying regions ceiling in, to establish area Z4.At it In its example, specified beacon can be deployed in inside hiding ceiling or siding, inside showcase, the office of locking or wall Cupboard is medium.Beacon deployment tool, the beacon reception software such as operated in such as mobile device of equipment 10,10 ' can be used In the signal strength for showing the beacon when setter is walked about around monitor area 200.
It is as noted above although area Z1-Z4 is depicted as circle, due to monitor area (such as wall and smallpox Plate etc.) inherent characteristic, or be attributed to enable Wave beam forming antenna beacon configuration etc., these areas can be it is any can structure The shape thought.
Therefore, monitor area 200 allows to establish multiple area Z1-Z4 using beacon B1-B4, can be overlapping or not Overlapping.Have been already configured with the equipment 10 of supervision application and then when equipment 10 is mobile around monitor area 200 from beacon B1- B4 receives beacon signal.Can be used radio frequency transceiver (Bluetooth Receiver 126(Fig. 1 of such as equipment 10)) it receives Beacon signal.If desired, then the supervision application of mobile device 10 or can permit not optionally with server communication There is the self-contained monitoring system in the case where server.Each deployment alternative has the advantage that, wherein the mould based on server Type includes the ability with centrostigma (all mobile devices are checked and monitored from it), and only customer's end equipment model includes by nothing The simplicity for the deployment that server installation is given.
As depicted in Figure 2, such as when being picked up in retail shop's example by consumer and in use, equipment 10 can be with Follow the path by monitor area.In this case, in illustrated example, equipment 10 is initially present in desk T1 On.Next, equipment 10 follows any interior position of the path P 1 into the area Bu Z1-Z4.Next, equipment 10 follows path Then position in both P2 to Z1 and Z2 is arrived through area Z1, and any interior position into the area Bu Z1-Z4.It connects down Come, equipment 10 follows path P 3 by area Z2 and into area Z3.Next, equipment 10 follows path P 4 from the area Z3 to Bu, area Any interior position in Z1-Z4, ends in area Z4 near outlet 210.
When equipment 10 crosses path P 1-P5 in monitor area 200, equipment 10 continues to receive signal from beacon B1-B5. When receiving from the signal of beacon B1-B5, equipment 10 can determine entrance to area and/or leave, and can execute Area specifically enters and/or leaves functionality, as below in relation to Fig. 4 A-4F detailed description.
When equipment 10 crosses path P 1-P5 in monitor area 200 before the example of the behavior of turning facilities 10, In Another example of monitor area 300 is elaborated in Fig. 3.
As depicted in Figure 3, monitor area 300 includes first layer monitor area 301, stairwell monitor area 302 and second layer monitor area 303.Eight beacon B5-B12 are deployed in monitor area 300, they be used for be similar to On relative to Fig. 2 description mode establish area Z5-Z12.Continue Fig. 3 example, in five areas Z5, Z6, Z8, Z10 and Z12 with And six different mobile devices 10 ' are depicted in the stairwell monitor area 302 of any outside in area Z5-Z12.This Outside, monitor area 300 includes four desks T6, T8, T10 and T12.As illustrated in the example deployment of Fig. 3, monitoring system System may include not with the related multiple beacons of desk, and such as beacon B5, B7, B9 and B11(is that is, in the area of odd-numbered In).Therefore, one-to-one relationship of the technology described herein independent of element, and can be with an infinite number of modification The system specifically modified is manufactured, all these modifications are within the scope of this disclosure.
Next, in order to illustrate system and method described herein, Fig. 4 A-4F elaborates to set for the movement to Fig. 2 Standby 10 provide the detail flowchart of the method 400 of safety.Each of Fig. 4 A-4E includes slave mobile device 10, beacon B1, letter The flow charts of four interconnection from the viewpoint of B2 and server S are marked, wherein vertical current indicates in each of this four elements Movement, and level stream indicates the movement between two or more in this four elements.
First since Fig. 4 A, beacon B1, B2 may be mounted at such as monitor area 200(Fig. 2) or monitor area 300 In the monitor area of (Fig. 3) etc.It, can be at factory or in surveillance zone when equipment is released for showing in frame 401 It will be using installation on device 10 at domain.
Continue, in the frame 402 of method 400, beacon B1 can be by being shaken and then in place being placed in prison It is activated in viewed area.Beacon B1 may include the motion detection feature for allowing beacon to wake up when shaking.Next, in frame 404, beacon B1 emit beacon B1 signal (for example, in area Z1 of Fig. 2).
In the example that wherein server is used to manage and monitor, server 128 receives beacon B1 letter in frame 406 Number.Next, server 128 configures beacon B1 using universal unique identifier (UUID) and other values in frame 408, with instruction Beacon B1 is about the signal that emit what distance, direction and/or shape, so that the area created by beacon B1 has for giving The desired characteristic of monitor area.As indicated above, beacon B1 and server 128 can be used including the low function of such as bluetooth Any suitable radio frequency method of consumption is communicated.
In another " serverless backup " example, mobile device itself will configure beacon.For example, (for example, at factory or At shop) the mobile device application that is loaded into mobile device may include certain configuration features, and these configuration features allow to exist Beacon is configured when into beacon configuration mode.Advantageously, this " serverless backup " operation mode allow system only by mobile device and Beacon is constituted, and eliminates the cost of the deployment based on server, ongoing management cost and complexity.This field is common Technical staff will be readily understood that, when system operates in " serverless backup " mode, use the described below of server Any feature can be alternately deployed in one or more mobile devices.
Next, beacon B1 receives UUID and other values in frame 410, and itself is reconfigured, so that beacon B1 is in frame 412 can use UUID appropriate and such as to emit beacon B1 signal by appropriate area occupied/characteristic of server configuration.In In one example, server 128 can not be reconfigured beacon B1.In another example, server 128 can periodically check Beacon B1, or can be on a periodic basis (such as in daily activation, by system operator input system configuration change When etc.) reconfigure beacon B1.
Continue, in frame 414, due to the position in the monitor area of the signal configuration based on beacon B1 of equipment 10, institute Equipment 10 is reached with beacon B1 signal.In the embodiment of Fig. 4 A, equipment 10 receives beacon B1 signal in frame 416, and then Area 1, which is executed, in frame 418 enters movement.
In one example, the supervision application in equipment 10 can consider that area 1 is its sintering (home zone), and Equipment 10 can permit the normal operating by user to equipment 10, and supervision application returns in backstage, so as not to hinder user With the interaction of equipment 10.
Still about Fig. 4 A, reference is made to beacon B2.The setting of beacon B2 is not illustrated in detail, because in addition to that can make With different UUID and value so that beacon B2 can be supported except different areas (such as area Z2), setting will be similar to that previous pass In the operation of beacon B1 description.In frame 420, transmitting beacon B2 believes beacon B2 in monitor area and specifically in area Z2 Number.In frame 422, beacon B2 signal reaches equipment 10.Equipment 10 receives beacon B2 signal in frame 423, and executes area in frame 424 2 enter movement.
In one example, due in short time frame inscribed collect mail mark both B1 and beacon B2 signal, so equipment 10 It can consider itself simultaneously in both area Z1 and Z2.In another example, equipment 10 may be noted that area Z2 enters, and will The user interface of equipment is switched to different foreground application or message, or can execute any other movement, such as depending on The area come into locks some equipment applications rather than other.It, can entering or leaving in a particular safety application When can include the given zone for the secret information not being taken, camera can be disabled.In another example, area's specific action can be prohibited With the access to non-security the Internet subnet.
Next, equipment 10 enters idle state in frame 426, it is present in identical area in wherein equipment 10, and permit No matter what access by user to equipment perhaps, as indicated by the area's certain logic stored in supervision application.Again Secondary, supervision application can continue to run in the background with detection zone out of and into allowing to take movement appropriate.
In the embodiment using heartbeat monitoring, equipment 10 sends heartbeat message to server 128 in frame 428.Server 128 receive heartbeat in frame 430, and send heartbeat response to equipment 10 in frame 432.For example, equipment 10 and server 128 can make It is communicated with cellular telecommunication art, WiFi technology or Bluetooth technology.As long as sending and receiving heartbeat signal, server 128 With each of equipment 10 can think that alarm condition is not present.
Fig. 4 B is turned next to, which depict, there is no the beacon stealing of alarm, beacon B1 exists first according to method 400 Frame 434 emits beacon B1 signal.In frame 436, beacon B1 signal does not reach equipment 10.Equipment 10 is not yet received in the determination of frame 438 To beacon B1 signal, and frame 440 wait X second to attempt to reacquire beacon B1 signal, wherein X can about at 1 second and Between 20 seconds, and if signal not yet reaches within the time, alarm condition can be entered.Next, in frame 442, letter It marks B1 signal and reaches equipment 10.Mobile device 10 receives beacon B1 signal in frame 444, and does not need to report in the determination of frame 446 Alert state, because beacon B1 signal is unavailable only for the relatively short duration.Hereafter, mobile device 10 enters in frame 448 Idle state.
Continue, Fig. 4 C depicts the alarm condition subsequently removed by method 400.Believe firstly, beacon B1 emits in frame 450 Mark B1 signal.In frame 452, beacon B1 signal does not reach equipment 10.Equipment 10 is determined in frame 454 not yet receives beacon B1 letter Number, and X seconds are waited in frame 456 to attempt to reacquire beacon B1 signal, wherein X can be between about 1 second and 20 seconds.With The example of Fig. 4 B compares, once the time passes by, mobile device 10 just starts pre- alarm movement in frame 458.For example, movement is set Standby 10 can alert in its user interface to user's displaying to move back in area Z1, or can start to send out beeping sound or hair Chirp.In another example, mobile device 10 can send alarm information to server 128.
After pre- alarm movement at frame 458, mobile device 10 waits Y seconds another periods in frame 460, to allow User pays attention to pre- alarm and returns to area Z1 or take any other appropriate movement as indicated previously, and wherein Y can be at 1 second Between 20 seconds.If user fails to move back in area Z1, or fails to reach any other area, then mobile device 10 is in frame 462 starting complete alarms or on-warning mode.Alarm mode or on-warning mode may include one or more warning actions or alarm The execution of movement can indicate by severity levels, and red warning, Amber alert are warned and alerted etc..Such as about figure What 4F was explained further, complete alarm mode may include any or all in following situations: mobile device 10 issues loudly Alarm (siren), mobile device 10 clap picture, mobile device 10 and uploaded information are alerted Security Officer, shifting to server 128 Global positioning system (GPS) coordinate is sent server 128 by dynamic equipment 10, mobile device 10 locks and passes through telephone subsystems Call help etc..In another embodiment, pre- alarm movement may include any in following movement: check beacon stealing;Inspection Look into beacon area;Find the beacon in range;Determine equipment 10 whether in (as example, establishing by the beacon in exit) In danger area;Such as check equipment 10 whether in movement using gyroscope;Check whether equipment 10 is charging;It checks GPS location.Advantageously, all these pre- alarm movements can be completed in approximate 2-3 seconds.
Next, beacon B1 signal reaches mobile device 10 in frame 464.In this case, mobile device 10 is in frame 466 can receive beacon B1 signal, and can remove alarm condition in frame 468 and return to idle state in frame 470.
Fig. 4 D depicts the example for removing alarm when being supported with frame in wherein method 400.For example, beacon B1 is in frame 472 transmitting beacon B1 signals, but mobile device 10 is not reached in 474 signal of frame.Equipment 10 is not yet received in the determination of frame 476 Beacon B1 signal, and X seconds are waited in frame 478 to attempt to reacquire beacon B1 signal, wherein X can be at about 1 second and 20 Between second.It is compared with the example of Fig. 4 B, but is similar to the example of Fig. 4 C, once the time passes by, mobile device 10 is just in frame The pre- alarm movement of 480 startings.For example, mobile device 10 can show alarm to move back to area in its user interface to user In Z1, or it can start to send out beeping sound or chirped.After pre- alarm movement at frame 480, mobile device 10 is in frame 482 wait Y seconds another periods, alert and are returned in area Z1 in advance or taken as indicated previously to allow user to pay attention to Any other appropriate movement, wherein Y can be between 1 second and 20 seconds.In this example, mobile device 10 is in frame 484 by with frame It is supported in (such as at desk T1 of Fig. 2) starting bracket.In this case, mobile device 10 indicates mistake in frame 486 False alarm, and enter idle state in frame 488.
Certainly, in another example, can be provided a user using the third of time interval or 4th or more set The alarm of more granular (granular).Be attributed in alarm or the movement of pre-alarm state herein any can be subdivided into shifting Three, the four or more alarm level that dynamic equipment 10 upgrades as time go by and gradually.In addition, although being depicted above Equipment 10 has been returned to bracket, but can receive signal from any other beacon B2-B12 to terminate to report by equipment 10 Alert state.On the contrary, equipment 10 can be stood if equipment 10 receives signal from beacon B5(Fig. 2 for being placed near exit) Enter alarm condition.
Fig. 4 E is turned next to, method 400 is alarmed including server side heartbeat.For example, equipment 10 is in frame 490 to server 128 send heartbeat message.Server 128 receives heartbeat in time T in frame 492, and sends heartbeat to equipment 10 in frame 494 and ring It answers.However, if server 128 fails to receive another heartbeat letter from equipment 10 in frame 496 in frame 495 to time T+Z Number, then server 128 can star server side alarm in frame 498.Server side alarm can alert the peace in monitor area Full personnel equipment 10 has disappeared, and can take appropriate action.For example, server 128 can star the erasing to equipment Deng.In another example, server 128 can also be using management server, and can be received and be answered with slave mobile device 10 With use information, allow to track overall use information for advertisement or other commercial objects.
Fig. 4 F is the flow chart for illustrating the additional detail of alarm technique.For example, can be in the frame 462 and/or Fig. 4 E of Fig. 4 C 498 call method 500 of frame, or special step etc. can be called in a different order during the pre-alarm state of frame 458. Method 500 starts from frame 552, and wherein processor 12(is referring to Fig. 1) determine that the Bluetooth signal from beacon (for example, beacon B1) is It is no interior in the desired range.For example, processor 12 can determine whether receive in the Bluetooth Receiver 26 of mobile device 10 Bluetooth signal from beacon.If processor 12 determines Bluetooth signal in range, such as when mobile device 10 is schemed in area Z1( 2) when (it can be represented as comfort zone) is interior, then processor 12 maintains equipment 10 in normal manipulation mode.In embodiment In, the range of beacon is adjustable.For example, can by select desired beacon signal intensity (such as by select it is weak, in Or long) set the range of beacon.
If processor 12 determines Bluetooth signal not in range, such as when equipment enters area Z2(Fig. 2) (it can be by table It is shown as warning area) when, then processor 12 activates alarm mode in frame 556.When equipment 10 is converted to alarm mode, activation movement The alarm 16 of equipment 10.Alarm can have various triggering options.For example, in very close monitoring, when equipment 10 exists When except three to six specified foot radius, alarm 16 can be triggered.In another example, in big room monitoring, when setting When exceeding 50 to seven ten foot radius for 10, alarm 16 can be triggered.As discussed above, alarm 16 can be audible Alarm, visual alarm or combinations thereof.In embodiment, when activating alarm 16 during alarm mode, alarm 16 It cannot be deactivated, and the intensity of alarm 16 cannot be lowered.For example, when alarm 16 is audible alarm, alarm The volume of device 16 cannot be lowered.Direct slave mobile device 10 of alarming issues, and is such as issued via loudspeaker with max volume.In In embodiment, when activating alarm mode, Email or message can be alerted to retail colleague or through transmission.It is set from movement Standby 10 emit the notice of the activation of on-warning mode to server 128.
In frame 560, the setting of mobile device 10, under WiFi or the cellular network setting of such as mobile device 10 are locked Come, to prevent setting to be changed.The locking of these settings gets off to enable mobile device 10 to be in alarm mode in equipment 10 Shi Jixu emits data to server 28.It can monitor data, and device data can be reset into factory set.In addition, Power knob, equipment factory reset functionality or program unloading can be disabled, to prevent equipment from distorting and prevent from equipment 10 remove safety measure.Furthermore it is possible to alarm screen be activated to overwhelm all activities of equipment, to keep equipment unavailable.This It outside, can be from the long-range sweep equipment Proprietary Information of equipment 10.In addition, in frame 560, lock may include all buttons locking Get off and/or activate locking, so that equipment is prevented to be activated or reactivate in future.
In frame 562, it is activated via position tracker 22 to the tracking of mobile device 10.In embodiment, even if when setting When for 10 in initial position, the position of each mobile device 10 is shown always on GPS map.In another embodiment, it rings The position of mobile device 10 should be identified on GPS map in the activation of alarm mode.Via position tracker 22 to equipment 10 Tracking enables equipment 10 to be retrieved in the case where equipment 10 is misplaced and sets or stolen.Furthermore it is possible to which it is clear to execute equipment Point is calculated, without the physical access to each retail location.Data from position tracker 22 can be launched into clothes Business device 28.In another embodiment, position tracker 22 can issue tracking signal, and the tracking signal can be such as by managing Mechanism is used for positioning device 10.In alternative embodiments, even if when in retail environment, beacon 30 and mobile device 10 Position is also continuously tracked or is monitored.
In frame 564, imaging device 18 is activated with focused image data.For example, imaging device 18 can capture physical rings Border or hold equipment people static shooting or video data.Image data can be launched into server 28, from wherein can be with May have access to image data such as management organization.In another embodiment, the image for enabling or disabling the people of alarm can be with It is captured and is emitted to server 28.
It is to be understood that the frame of Fig. 4 A-4F continuously or nearly can simultaneously occur.In addition, although in bluetooth The above method is described in the context of signal, but other types of wireless signal also can be used, such as WiFi or wireless Electric frequency signal.
In alternative embodiment (not shown), when receiving Bluetooth signal, alarm mode can be activated.For example, letter Mark can be placed in fixed position, such as outlet 210(Fig. 2) and the zone of alarm Z4 that is established around beacon B4 near. In this embodiment, when being not received by Bluetooth signal, mobile device 10 operates in the normal mode, and works as and receive indigo plant When tooth signal, alarm mode is activated.
In still another alternative embodiment, the combination of safety method can be used, beacon is used to set up easypro wherein Suitable both area and zone of alarm.
Although method can be used for it is expected building for area about specific using technology described herein is described In vertical any situation.Therefore, specific example embodiments are meant only to interpretation technique, rather than restriction technologies.
For claim describes phrase "...... at least one" about multiple element, what this was intended to mean to list At least one of at least one of element is multiple, and be not limited to each element.For example, " element A, element B and element C At least one of " it is intended to refer to individual element A or individually element B or individually element C or any combination thereof." member At least one of part A, element B and element C " is not intended at least one be restricted at least one of element A, element B At least one of a and element C.
This written description uses examples to disclose the present invention, including optimal mode, and also makes those skilled in the art The present invention can be practiced, including manufacturing and using any equipment or system and executing any method being incorporated to.Of the invention can The scope of the patents is defined by the claims, and may include the other examples that those skilled in the art expect.If these are other Example, which has, has no different structural details from the literal language of claim, or if they include with and claim The equivalent structural elements without essence difference of literal language, then these other examples are intended to come within the scope of the following claims.
As by skilled artisans will appreciate that, each aspect of the present invention can be embodied as system, method or calculating Machine program product.Therefore, each aspect of the present invention can take complete hardware embodiment, complete software embodiment (including firmware, Resident software, microcode etc.) or integration software and hardware aspect (it can be generally referred to herein as " servicing " herein, " electricity Road ", " route ", " module " and/or " system ") embodiment form.In addition, each aspect of the present invention can be taken at one Or the form of the computer program product embodied in multiple computer-readable mediums, the medium have the calculating embodied on it Machine readable program code.
It can use any combination of one or more computer-readable mediums.Computer-readable medium can be computer Readable signal medium or computer readable storage medium.Computer readable storage medium can be, such as, but not limited to, electronics, Magnetism, optics, electromagnetism, infrared or semiconductor system, device or equipment or any appropriate combination above-mentioned.It is computer-readable to deposit The example (non-exhaustive list) particularly of storage media will include the following: has the electrical connection, portable of one or more conducting wires Computer disk, hard disk, random-access memory (ram), read-only memory (ROM), Erasable Programmable Read Only Memory EPROM (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), optical storage apparatus, magnetic storage Equipment or any appropriate combination above-mentioned.In the context of this document, computer readable storage medium can be any tangible Medium, may include or store for it is being used by instruction execution system, device or equipment or with instruction execution system, device Or the program that equipment is used in combination.
Any medium appropriate can be used to emit the program code embodied on a computer-readable medium and/or can hold Row instruction, including but not limited to wirelessly, wired, fiber optic cables, RF etc. or any appropriate combination above-mentioned.
Computer program code for executing the operation for being used for each aspect of the present invention can be with one or more programmings Any combination of language is write, and the programming language includes the programming language of the object-oriented of Java, Smalltalk, C++ etc. It makes peace the conventional process programming language of such as " C " programming language or similar programming language.Program code can be completely user's On computer (equipment) execute, partly on the user's computer execute, as independent software package execute, partly with It partly executes on the computer at family and on the remote computer or executes on a remote computer or server completely.In In the case where later, remote computer can arrive the computer of user by any kind of network connection, and the network includes Network of LAN (LAN) or wide area network (WAN), or can make to be connected to outer computer (for example, using ISP Pass through internet).
Herein with reference to the flow chart of method, apparatus (system) and computer program product of embodiment according to the present invention Show and/or block diagram describes each aspect of the present invention.It will be appreciated that each frame and process of process diagram and/or block diagram The combination of diagram and/or the frame in block diagram can be realized by computer program instructions.These computer program instructions can be by The processor of general purpose computer, special purpose computer or other programmable data processing units is supplied to generate machine, so that through It is created by the instruction that computer or the processor of other programmable data processing units execute for realizing flowchart and or block diagram One or more frames in specify function action means.
These computer program instructions can also store in computer-readable medium, can guide computer, other Programmable data processing unit or other equipment are worked with ad hoc base, so that the instruction of storage in computer-readable medium Generate the article of manufacture of the instruction for the function action specified in one or more frames including implementation flow chart and/or block diagram.
Computer program instructions can also be loaded into computer, other programmable data processing units or other equipment On, so that a series of operating procedure is executed in computer, other programmable devices or other equipment, to generate computer The process of realization, so that the instruction executed on a computer or other programmable device is provided for realizing flow chart and/or frame The process for the function action specified in one or more frames of figure.
Claims (according to the 19th article of modification of treaty)
1. a kind of mobile device management system, the system comprises:
The first beacon including the first wireless transceiver, is programmed to:
Receive the first unique identifier and the first signal level;And
Repeatedly emit the first beacon signal with first unique identifier with first signal level, wherein described First signal level of first beacon signal establishes first area of coverage near first beacon;
The second beacon including the second wireless transceiver, is programmed to:
Receive the second unique identifier and second signal level;And
Repeatedly emit the second beacon signal with second unique identifier with the second signal level, wherein described The second signal level of second beacon signal establishes second area of coverage near second beacon;And
A kind of mobile device, comprising:
At least one wireless transceiver;
Memory;And
Processor, the processor are programmed to:
When the wireless transceiver receives first beacon signal with first unique identifier, based on described First unique identifier executes the firstth area and enters movement;
When the wireless transceiver fails to receive first beacon signal up to first time period, warning action is executed;
When the wireless transceiver receives second beacon signal, terminate the warning action;And
When the wireless transceiver receives second beacon signal with second unique identifier, based on described Second unique identifier executes the secondth area and enters movement.
2. mobile device management system according to claim 1, wherein the processor of the mobile device is also compiled Journey is to receive and respond to the heartbeat signal from mobile device management server, wherein the mobile device management server is matched It is set to and is failing to receive starting alarm when the heartbeat signal from the mobile device reaches designated time period.
3. mobile device management system according to claim 1, wherein the first beacon emissions Bluetooth Low Energy signal.
4. mobile device management system according to claim 1, wherein it includes described in modification that firstth area, which enters movement, The foreground application of mobile device.
5. mobile device management system according to claim 1, wherein secondth area, which enters movement, is included in the shifting Start alarm sequence in dynamic equipment.
6. mobile device management system according to claim 1, wherein the processor of the mobile device also configures The warning action is executed at providing when receiving first beacon signal.
7. mobile device management system according to claim 1, wherein device management server is configured to manage described One and second multiple mobile devices in area.
8. mobile device management system according to claim 1, wherein executing the warning action includes activating the shifting The camera of dynamic equipment, and by the picture upload clapped by the camera to device management server.
9. mobile device management system according to claim 1, wherein the execution warning action includes will be described The global position system location information of mobile device is sent to device management server.
10. mobile device management system according to claim 1, wherein the processor is configured to monitor the movement The use information of equipment, and by the use information upload device management server of the mobile device.
11. a kind of method for managing mobile device, which comprises
The first beacon is programmed using the first unique identifier and the first signal level;
Repeatedly emit the first beacon signal with first unique identifier with first signal level, wherein described First signal level of first beacon signal establishes first area of coverage near first beacon;
Utilize the second beacon of the second unique identifier and second signal level program;
Repeatedly emit the second beacon signal with second unique identifier with the second signal level, wherein described The second signal level of second beacon signal establishes second area of coverage near second beacon;
When mobile device receives first beacon signal with first unique identifier, only based on described first One identifier executes the firstth area and enters movement;
When the mobile device fails to receive first beacon signal up to first time period, warning action is executed;
When the mobile device receives second beacon signal, terminate the warning action;And
When the mobile device receives second beacon signal with second unique identifier, based on described the Two unique identifiers execute the secondth area and enter movement.
12. according to the method for claim 11, further including receiving and responding to from the mobile device management system Heartbeat signal, and the starting report when failing to receive the heartbeat signal from the mobile device up to designated time period It is alert.
13. according to the method for claim 11, wherein first beacon emissions include transmitting Bluetooth Low Energy signal.
14. according to the method for claim 11, wherein executing firstth area to enter movement includes modifying the movement to set Standby foreground application.
15. according to the method for claim 11, being included in the mobile device wherein executing secondth area and entering movement Upper starting alarm sequence.
16. further including according to the method for claim 11, executing the warning when receiving first beacon signal Movement.
17. according to the method for claim 11, further including the multiple mobile devices managed in first and secondth area.
18. it further include according to the method for claim 11, activating the camera of the mobile device, and it will be by the camera The picture upload of bat is to device management server.
19. according to the method for claim 11, further including sending out the global position system location information of the mobile device It is sent to device management server.
20. according to the method for claim 11, further including monitoring the use information of the mobile device, and by the shifting The use information of dynamic equipment uploads to device management server.

Claims (20)

1. a kind of mobile device management system, the system comprises:
The first beacon including the first wireless transceiver, is programmed to:
Receive the first unique identifier and the first signal level;And
Repeatedly emit the first beacon signal with first unique identifier with first signal level, wherein described First signal level of first beacon signal establishes first area of coverage near first beacon;
The second beacon including the second wireless transceiver, is programmed to:
Receive the second unique identifier and second signal level;And
Repeatedly emit the second beacon signal with second unique identifier with the second signal level, wherein described The second signal level of second beacon signal establishes second area of coverage near second beacon;And
A kind of mobile device, comprising:
At least one wireless transceiver;
Memory;And
Processor, the processor are programmed to:
When the wireless transceiver receives first beacon signal with first unique identifier, based on described First unique identifier executes the firstth area and enters movement;
When the wireless transceiver fails to receive first beacon signal up to first time period, warning action is executed;
When the wireless transceiver receives the one or more in the first beacon signal or second beacon signal, terminate The warning action;And
When the wireless transceiver receives second beacon signal with second unique identifier, based on described Second unique identifier executes the secondth area and enters movement.
2. mobile device management system according to claim 1, wherein the processor of the mobile device is also compiled Journey is to receive and respond to the heartbeat signal from mobile device management server, wherein the mobile device management server is matched It is set to and is failing to receive starting alarm when the heartbeat signal from the mobile device reaches designated time period.
3. mobile device management system according to claim 1, wherein the first beacon emissions Bluetooth Low Energy signal.
4. mobile device management system according to claim 1, wherein it includes described in modification that firstth area, which enters movement, The foreground application of mobile device.
5. mobile device management system according to claim 1, wherein secondth area, which enters movement, is included in the shifting Start alarm sequence in dynamic equipment.
6. mobile device management system according to claim 1, wherein the processor of the mobile device also configures The warning action is executed at providing when receiving first beacon signal.
7. mobile device management system according to claim 1, wherein device management server is configured to manage described One and second multiple mobile devices in area.
8. mobile device management system according to claim 1, wherein executing the warning action includes activating the shifting The camera of dynamic equipment, and by the picture upload clapped by the camera to device management server.
9. mobile device management system according to claim 1, wherein the execution warning action includes will be described The global position system location information of mobile device is sent to device management server.
10. mobile device management system according to claim 1, wherein the processor is configured to monitor the movement The use information of equipment, and by the use information upload device management server of the mobile device.
11. a kind of method for managing mobile device, which comprises
The first beacon is programmed using the first unique identifier and the first signal level;
Repeatedly emit the first beacon signal with first unique identifier with first signal level, wherein described First signal level of first beacon signal establishes first area of coverage near first beacon;
Utilize the second beacon of the second unique identifier and second signal level program;
Repeatedly emit the second beacon signal with second unique identifier with the second signal level, wherein described The second signal level of second beacon signal establishes second area of coverage near second beacon;
When mobile device receives first beacon signal with first unique identifier, only based on described first One identifier executes the firstth area and enters movement;
When the mobile device fails to receive first beacon signal up to first time period, warning action is executed;
When the mobile device receives the one or more in the first beacon signal or second beacon signal, terminate institute State warning action;And
When the mobile device receives second beacon signal with second unique identifier, based on described the Two unique identifiers execute the secondth area and enter movement.
12. according to the method for claim 11, further including receiving and responding to from the mobile device management system Heartbeat signal, and the starting report when failing to receive the heartbeat signal from the mobile device up to designated time period It is alert.
13. according to the method for claim 11, wherein first beacon emissions include transmitting Bluetooth Low Energy signal.
14. according to the method for claim 11, wherein executing firstth area to enter movement includes modifying the movement to set Standby foreground application.
15. according to the method for claim 11, being included in the mobile device wherein executing secondth area and entering movement Upper starting alarm sequence.
16. further including according to the method for claim 11, executing the warning when receiving first beacon signal Movement.
17. according to the method for claim 11, further including the multiple mobile devices managed in first and secondth area.
18. it further include according to the method for claim 11, activating the camera of the mobile device, and it will be by the camera The picture upload of bat is to device management server.
19. according to the method for claim 11, further including sending out the global position system location information of the mobile device It is sent to device management server.
20. according to the method for claim 11, further including monitoring the use information of the mobile device, and by the shifting The use information of dynamic equipment uploads to device management server.
CN201880025942.1A 2017-02-21 2018-02-21 Mobile device management system and method Pending CN110521223A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201762461448P 2017-02-21 2017-02-21
US62/461448 2017-02-21
US201762578232P 2017-10-27 2017-10-27
US62/578232 2017-10-27
PCT/US2018/018914 WO2018156555A1 (en) 2017-02-21 2018-02-21 Mobil device management system and method

Publications (1)

Publication Number Publication Date
CN110521223A true CN110521223A (en) 2019-11-29

Family

ID=63254104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880025942.1A Pending CN110521223A (en) 2017-02-21 2018-02-21 Mobile device management system and method

Country Status (5)

Country Link
US (2) US10708785B2 (en)
EP (1) EP3586531A4 (en)
CN (1) CN110521223A (en)
CA (1) CA3054291C (en)
WO (1) WO2018156555A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980283A (en) * 2021-02-22 2022-08-30 维沃移动通信有限公司 State switching method and device, and beacon signal transmission and device

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9779596B2 (en) 2012-10-24 2017-10-03 Apple Inc. Devices and methods for locating accessories of an electronic device
CN110521223A (en) 2017-02-21 2019-11-29 蝎子保安产品公司 Mobile device management system and method
US11622275B2 (en) 2017-02-21 2023-04-04 Scorpion Security Products, Inc. Geo-radius based mobile device management
US11641563B2 (en) 2018-09-28 2023-05-02 Apple Inc. System and method for locating wireless accessories
US11863671B1 (en) 2019-04-17 2024-01-02 Apple Inc. Accessory assisted account recovery
WO2020214709A1 (en) * 2019-04-17 2020-10-22 Prestacom Services Llc Location data harvesting and pruning for wireless accessory devices
CN113796104A (en) * 2019-04-17 2021-12-14 苹果公司 Detachment notification for wireless accessories
CN111640279B (en) * 2020-04-07 2021-11-26 广州中石科技有限公司 Dangerous area early warning method and system
US11519999B2 (en) 2020-07-10 2022-12-06 Red Point Positioning Corporation Method and apparatus for obtaining location information after transitioning between modes of communications
US11789749B2 (en) 2020-07-21 2023-10-17 Scorpion Security Products, Inc. Automatic application configurator method
WO2022020325A1 (en) * 2020-07-21 2022-01-27 Scorpion Security Products, Inc. Geo-radius based mobile device management
US11641708B2 (en) 2020-08-28 2023-05-02 Abl Ip Holding Llc Light fixture controllable via dual networks
US11889302B2 (en) 2020-08-28 2024-01-30 Apple Inc. Maintenance of wireless devices
US12073705B2 (en) 2021-05-07 2024-08-27 Apple Inc. Separation alerts for notification while traveling
US20240072840A1 (en) * 2022-08-25 2024-02-29 Zebra Technologies Corporation Devices and Methods for Using Separate Advertisement Streams in a Single Beacon Device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395439A (en) * 2001-07-10 2003-02-05 华为技术有限公司 Shutdown restriction method for shutdown restricted safety mobile terminal
US20120139723A1 (en) * 2010-12-05 2012-06-07 Avila Carl Anthony Tony GPS Based Tracking And Reporting System
CN104798355A (en) * 2012-09-18 2015-07-22 思杰系统有限公司 Mobile device management and security
US20150365796A1 (en) * 2013-01-29 2015-12-17 Georeach Limited A method of generating an alert message
CN105701986A (en) * 2014-11-28 2016-06-22 上海青悦信息科技有限公司 Baby intelligent care device and system
CN106023657A (en) * 2015-03-30 2016-10-12 国际商业机器公司 Implementing A Restricted-Operation Region For Unmanned Vehicles
US20160307416A1 (en) * 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system, and/or method for monitoring a device within a zone
US20170048665A1 (en) * 2015-08-14 2017-02-16 T-Mobile Usa, Inc. Establishing geo-fences and related alarms

Family Cites Families (101)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4573042A (en) 1983-03-14 1986-02-25 Sensormatic Electronics Corporation Electronic article surveillance security system
AU586356B2 (en) 1987-06-03 1989-07-06 Magry Systems Co., Ltd. Shoplifting preventing device
DE3733808A1 (en) 1987-10-07 1989-05-11 T E C Computer Gmbh DEVICE FOR MONITORING PROPERTIES AND / OR PERSONS
US5151684A (en) 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
DE4219678A1 (en) 1992-06-16 1994-01-05 Eduard Kuehnert Method and arrangement for securing people or objects
US5438319A (en) 1993-06-24 1995-08-01 Cart Watch, Inc. Golf cart control and monitoring apparatus
DE19822670A1 (en) 1998-05-20 1999-11-25 Meto International Gmbh Device for electronic surveillance of goods
US7218226B2 (en) 2004-03-01 2007-05-15 Apple Inc. Acceleration-based theft detection system for portable electronic devices
US6907254B1 (en) 2001-03-08 2005-06-14 Cisco Technology, Inc. Method and apparatus for controlling a quiet zone for wireless units
US6563427B2 (en) 2001-09-28 2003-05-13 Motorola, Inc. Proximity monitoring communication system
US7183917B2 (en) 2003-05-19 2007-02-27 Checkpoint Systems, Inc. EAS/RFID identification hard tags
US6967576B2 (en) 2003-06-25 2005-11-22 Motorola, Inc. Item location tracking system and method
US7327250B2 (en) 2003-07-25 2008-02-05 Qualcomm Incorporated System for providing a virtual vehicle boundary
TWI227400B (en) 2003-10-28 2005-02-01 Primax Electronics Ltd Security system and method for protecting computer system
US7777612B2 (en) 2004-04-13 2010-08-17 Midtronics, Inc. Theft prevention device for automotive vehicle service centers
US7561102B2 (en) 2004-07-08 2009-07-14 Lojack Operating Company, Lp Method of and system for expanding localized missing customer-vehicle law enforcement-aided VHF recovery networks with location-on-demand supplemental service features via such networks for improved law enforcement-aided recovery, and via the internet for providing supplemental customer service features
US7168668B2 (en) 2004-08-04 2007-01-30 Checkpoint Systems, Inc. Damage resistant antenna mount
US8242910B2 (en) 2004-12-09 2012-08-14 Johan Skjellerup Security system for preventing unauthorized removal of merchandise
US7490720B2 (en) 2005-04-25 2009-02-17 Apple Inc. Greeting card system including a window to allow for inventory and activation
US8314700B2 (en) 2005-08-11 2012-11-20 International Business Machines Corporation Deterring theft of mobile electronic devices
US7714265B2 (en) 2005-09-30 2010-05-11 Apple Inc. Integrated proximity sensor and light sensor
US7830259B2 (en) 2005-10-11 2010-11-09 Nanonation Incorporated Method and apparatus for RFID initiated interactive retail merchandising
US8539590B2 (en) 2005-12-20 2013-09-17 Apple Inc. Protecting electronic devices from extended unauthorized use
US8593276B2 (en) 2006-02-01 2013-11-26 Qualcomm Incorporated Method and apparatus for asset geofencing
CN101449303B (en) 2006-03-31 2013-02-27 检查站系统股份有限公司 System and method for securing and displaying items for merchandising
US7498985B1 (en) 2006-06-29 2009-03-03 Woo Arthur N Geo-fencing GPS-enabling assets
US8226474B2 (en) 2006-09-08 2012-07-24 Igt Mobile gaming devices for use in a gaming network having gaming and non-gaming zones
US20080083982A1 (en) 2006-10-10 2008-04-10 International Business Machines Corporation Method and system for initiating proximity warning alarm for electronic devices and prohibiting operation thereof
US7696887B1 (en) 2006-10-25 2010-04-13 Arturo Echavarria Person tracking and communication system
US20080125965A1 (en) 2006-11-27 2008-05-29 Carani Sherry L Tracking System and Method with Automatic Map Selector and Geo Fence Defining Features
US7705728B2 (en) * 2006-12-18 2010-04-27 Motorola, Inc. Selectively sending notifications when an object tracking device is outside a range of an anchor beacon
US20080204239A1 (en) 2007-02-28 2008-08-28 Christopher Marszalek Apparatus, system and/or method for wirelessly securing and/or for wirelessly monitoring an article
US20080291044A1 (en) 2007-05-23 2008-11-27 Wan Shan Chan Alerting system and process for objects within a detectable range of distance
US8472203B2 (en) 2007-09-04 2013-06-25 Apple Inc. Assembly of a handheld electronic device
EP2250628B1 (en) 2008-01-04 2013-08-28 Walker Digital, LLC Vending machine and social and retail hotspots
CA2732830C (en) 2008-08-08 2016-01-19 Absolute Software Corporation Secure computing environment to address theft and unauthorized access
US8558714B1 (en) 2008-11-03 2013-10-15 Avid Technologies, Inc. Radio frequency-based proximity detection system
US8279077B1 (en) 2008-11-03 2012-10-02 Avid Technologies, Inc. Radio frequency-based proximity detection system
US8587662B1 (en) 2008-11-06 2013-11-19 Target Brands, Inc. Theft trend analysis and response
US8018329B2 (en) 2008-12-12 2011-09-13 Gordon * Howard Associates, Inc. Automated geo-fence boundary configuration and activation
AU2010242839A1 (en) 2009-05-01 2011-11-03 Checkpoint Systems, Inc. Transmit-only electronic article surveillance system and method
WO2011029195A1 (en) 2009-09-09 2011-03-17 Absolute Software Corporation Alert for real-time risk of theft or loss
US20160239794A9 (en) 2009-09-21 2016-08-18 Checkpoint Systems, Inc. Retail product tracking system, method, and apparatus
US20110187531A1 (en) 2009-12-14 2011-08-04 Apple Inc. Systems and methods for securing handheld electronic devices
US20110149078A1 (en) 2009-12-18 2011-06-23 At&T Intellectual Property I, Lp Wireless anti-theft security communications device and service
US9298954B1 (en) 2010-02-03 2016-03-29 Synapse Wireless, Inc. Tag security systems and methods for articles of merchandise
US8297233B2 (en) 2010-03-23 2012-10-30 Woodstream Corporation Radial-shape wireless dog fence system and method
US8712432B2 (en) 2010-07-01 2014-04-29 Absolute Software Corporation Method and system for tracking mobile electronic devices while conserving cellular network resources
US20120185933A1 (en) 2011-01-14 2012-07-19 Belk Andrew T User account for system protection or recovery
PL2686837T3 (en) 2011-03-17 2017-04-28 Maxwell Forest Pty Ltd. Pet tracking
US8988898B2 (en) 2011-05-03 2015-03-24 Apple Inc. Power cable having security feature
KR20120127830A (en) 2011-05-16 2012-11-26 삼성전자주식회사 User interface method for terminal of vehicle and apparatus tererof
US8878673B2 (en) 2011-05-19 2014-11-04 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US10715380B2 (en) 2011-05-23 2020-07-14 Apple Inc. Setting a reminder that is triggered by a target user device
US9247377B2 (en) 2011-05-23 2016-01-26 Apple Inc. Setting a reminder that is triggered by a target user device
US8626187B2 (en) 2011-06-03 2014-01-07 Apple Inc. Monitoring geofence exit
US9179538B2 (en) 2011-06-09 2015-11-03 Apple Inc. Electromagnetic shielding structures for selectively shielding components on a substrate
US9020523B2 (en) 2011-07-12 2015-04-28 Qualcomm Incorporated Position estimating for a mobile device
KR101873415B1 (en) 2011-09-08 2018-07-02 엘지전자 주식회사 Mobile terminal and control method for the same
US20130080289A1 (en) 2011-09-28 2013-03-28 Rupessh Ranen Roy Retail shopping
US9092969B2 (en) 2011-12-29 2015-07-28 Verizon Patent And Licensing Inc. Method and system for invoking a security function of a device based on proximity to another device
WO2013187991A2 (en) 2012-04-03 2013-12-19 Invue Security Products Inc. Pre-alarm for abnormal merchandise handling
WO2014107184A2 (en) 2012-04-05 2014-07-10 Invue Security Products Inc. Merchandise user tracking system and method
US10360593B2 (en) 2012-04-24 2019-07-23 Qualcomm Incorporated Retail proximity marketing
US9000920B2 (en) 2012-05-15 2015-04-07 Invue Security Products Inc. Reduced cost merchandise display security device including merchandise power supply
US9210545B2 (en) 2012-06-05 2015-12-08 Apple Inc. Managing alerts based on context
US8878670B2 (en) 2012-09-03 2014-11-04 Qualcomm Incorporated Method and apparatus for improving the battery life of a tracker attached to an asset while outside a base safe-zone
US9105899B2 (en) 2012-09-07 2015-08-11 Apple Inc. Electronic device subassemblies
US8913400B2 (en) 2012-09-10 2014-12-16 Apple Inc. Systems and methods for shielding circuitry from interference with a shield assembly having a removable tab
US9048124B2 (en) 2012-09-20 2015-06-02 Apple Inc. Heat sinking and electromagnetic shielding structures
DE102013017245A1 (en) 2012-10-26 2014-04-30 Sony Corporation Theft detection system
US9173061B2 (en) 2012-12-17 2015-10-27 Apple Inc. Monitoring a mobile device en route to destination
US9749800B2 (en) 2012-12-21 2017-08-29 Apple Inc. Controlling wireless scans used to determine the location of a portable electronic device
US9215559B2 (en) 2013-03-04 2015-12-15 Apple Inc. Adding geo-fences based on time
WO2014134718A1 (en) 2013-03-08 2014-09-12 Rtf Research & Technologies Inc System, method and computer readable medium for managing mobile devices
US9215833B2 (en) 2013-03-15 2015-12-15 Apple Inc. Electronic device with heat dissipating electromagnetic interference shielding structures
US9113300B2 (en) 2013-03-15 2015-08-18 Apple Inc. Proximity fence
US9432807B2 (en) 2013-05-23 2016-08-30 Honeywell International Inc. System and method with automatic radius crossing notification for global positioning system (GPS) tracker
US9400321B2 (en) 2013-06-05 2016-07-26 Apple Inc. Utilizing mobile wireless access gateways for location and context purposes
US9706032B2 (en) 2013-06-06 2017-07-11 Apple Inc. Device locator disable authentication
US9191832B2 (en) 2013-06-06 2015-11-17 Apple Inc. Category-based fence
US9600049B2 (en) 2013-06-07 2017-03-21 Apple Inc. Motion fencing
US9307358B2 (en) 2013-06-09 2016-04-05 Apple Inc. Non-intrusive region notification
WO2015048120A1 (en) 2013-09-29 2015-04-02 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US9495318B2 (en) 2013-11-25 2016-11-15 Apple Inc. Synchronizing transactions for a single master over multiple busses
US9167381B2 (en) 2013-12-19 2015-10-20 Motorola Solutions, Inc. Geo-fence based alerts
US20150201306A1 (en) 2014-01-16 2015-07-16 Apple Inc. Range-Free Proximity Determination
US9990659B2 (en) * 2014-05-28 2018-06-05 Cellco Partnership In-store self-serve and zoning using geo-fencing
US9762722B2 (en) * 2014-11-17 2017-09-12 International Business Machines Corporation Location-based and time-based mobile device security
US20160307209A1 (en) 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system and method for wirelessly collecting data corresponding to a security device
WO2016167969A1 (en) 2015-04-17 2016-10-20 Sennco Solution, Llc Apparatus, system and method for wirelessly collecting data corresponding to a security device
US20160308952A1 (en) 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system and method for wirelessly collecting data corresponding to a security device
US20160307415A1 (en) 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system and method for monitoring a device within a zone
WO2016167968A1 (en) 2015-04-17 2016-10-20 Sennco Solutions, Llc Apparatus, system, and/or method for monitoring a device within a zone
US10897148B2 (en) 2016-09-23 2021-01-19 Apple Inc. Wireless charging mats with multi-layer transmitter coil arrangements
CN114900858A (en) * 2016-12-30 2022-08-12 英特尔公司 Method and apparatus for radio communication
CN110521223A (en) 2017-02-21 2019-11-29 蝎子保安产品公司 Mobile device management system and method
US10223553B2 (en) 2017-05-30 2019-03-05 Apple Inc. Wireless device security system
US10217337B1 (en) 2017-08-31 2019-02-26 Sennco Solutions, Inc. Security device registration
US10736246B2 (en) 2018-09-28 2020-08-04 Apple Inc. Electromagnetic interference shielding having a magnetically attracted shield arm
US10645534B1 (en) 2019-02-01 2020-05-05 Tile, Inc. User presence-enabled tracking device functionality

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1395439A (en) * 2001-07-10 2003-02-05 华为技术有限公司 Shutdown restriction method for shutdown restricted safety mobile terminal
US20120139723A1 (en) * 2010-12-05 2012-06-07 Avila Carl Anthony Tony GPS Based Tracking And Reporting System
CN104798355A (en) * 2012-09-18 2015-07-22 思杰系统有限公司 Mobile device management and security
US20150365796A1 (en) * 2013-01-29 2015-12-17 Georeach Limited A method of generating an alert message
CN105701986A (en) * 2014-11-28 2016-06-22 上海青悦信息科技有限公司 Baby intelligent care device and system
CN106023657A (en) * 2015-03-30 2016-10-12 国际商业机器公司 Implementing A Restricted-Operation Region For Unmanned Vehicles
US20160307416A1 (en) * 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system, and/or method for monitoring a device within a zone
US20170048665A1 (en) * 2015-08-14 2017-02-16 T-Mobile Usa, Inc. Establishing geo-fences and related alarms

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114980283A (en) * 2021-02-22 2022-08-30 维沃移动通信有限公司 State switching method and device, and beacon signal transmission and device

Also Published As

Publication number Publication date
US20190373477A1 (en) 2019-12-05
US20200322806A1 (en) 2020-10-08
EP3586531A1 (en) 2020-01-01
US11337074B2 (en) 2022-05-17
WO2018156555A1 (en) 2018-08-30
CA3054291A1 (en) 2018-08-30
CA3054291C (en) 2024-03-19
EP3586531A4 (en) 2020-11-18
US10708785B2 (en) 2020-07-07

Similar Documents

Publication Publication Date Title
CN110521223A (en) Mobile device management system and method
US10384351B2 (en) Mobile robot with removable fabric panels
US9830804B2 (en) Methods, apparatuses, and computer program products for implementing situational control processes
JP2022533494A (en) Merchandise display security system and method
WO2014098993A1 (en) Alarm detection and notification system
US20190221083A1 (en) Wireless beacon tracking system for merchandise security
US20170178064A1 (en) Location-aware information system and method
WO2016179250A2 (en) Wireless beacon tracking system for merchandise security
US11861996B2 (en) Asset tracking and protection
US11622275B2 (en) Geo-radius based mobile device management
US20170154508A1 (en) Wireless beacon tracking system for merchandise security
US20210358291A1 (en) Alerthub system with two touch badge
JP2015052835A (en) Lending management system, and terminal management device
US20190164411A1 (en) Alerthub System with Two Touch Badge
JP2008146683A (en) Network system, control node, fixed node, information processing method and program
JP2013143123A (en) System for protecting wandering elderly person with dementia by transmitting/receiving bluetooth signal
JP2023006192A (en) Location information system
TWI578275B (en) Monitoring and control method and apparatus thereof
JP2007257534A (en) Abnormality notification terminal and management device
WO2022256689A1 (en) Wireless beacon tracking system for merchandise security
EP4186047A1 (en) Geo-radius based mobile device management
JP2007058489A (en) Annunciator, announcement system, and its program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20191129